Valgrind - exact leak location.
Kaz Kylheku
kaz@zeugmasystems.com
Thu Oct 26 16:06:00 GMT 2006
> Hi People,
>
> I have been trying to run valgrind to detect leaks in
> my backend C++ algorithm.
But what valgrind has detected is an invalid read, not a leak.
> the rogue operation is being performed inside
> ABCParser::parseString() however this is a very big
> function and I am unable to painstakingly go thru it
> to find out the possible source of leak.
What leak? The routine is dereferencing an invalid pointer.
> Is there a way out? Can valgrind give me the exact
> line number in a file where the "invalid read"
> occured?
Let's look at it:
==9984== by 0x1B97AB4E: ABCParser::parseString() (stl_vector.h:501)
The invalid read did occur in stl_vector.h:501. But that is the middle
of an inlined function that was incorporated into the body of
parseString(). It doesn't have its own stack frame, which would give a
backtrace to the parent function.
Inlining is an optimization which, as you can see, can interfere with
debugging.
Have you thought of recompiling the code with inlining disabled?
> How can I make valgrind point out the exact location
> of the error in my code?
In what way is is the machine address 0x1B97AB4E not an exact location?
Compile with -g, and then use objdump -S to an assembly listing
annotated with the source code lines.
More information about the Gcc-help
mailing list